1. A configuration management system would NOT normally provide: restricted access to the source code library the precise differences in versions of software component source code. facilities to compare test results with expected results. linkage of customer requirements to version numbers. 2. Which of the following is not a type of incremental testing approach? big-bang functional incrimination top down bottom up 3. Fault Masking is masking a fault by developer error condition hiding another error condition masking a fault by a tester creating a test case which does not reveal a fault 4. Which of the following is the odd one out? white box functional glass box structural 5. Test cases are designed during: test configuration. test planning. test specification test recording. 6. Which of the following is NOT true of incidents? incidents are raised when expected and actual results differ. incident resolution is the responsibility of the author of the software under test. incidents require investigation and/or correction. incidents may be raised against user requirements. 7. What can static analysis NOT find? unreachable (dead) code the use of a variable before it has been defined memory leaks array bound violations 8. In case of Large Systems only good test cases should be executed test cases written by good test engineers should be executed testing should be on the basis of risk only few tests should be run 9. Which of the following techniques is NOT a black box technique? syntax testing state transition testing lcsaj boundary value analysis 10. Which of the following is false in a system two different failures may have different severities. a fault need not affect the reliability of a system. undetected errors may lead to faults and eventually to incorrect behavior. a system is necessarily more reliable after debugging for the removal of a fault. 11. Test Conditions are derived from specifications test cases test data test design 12. . In prioritizing what to test, the most important objective is to: find as many faults as possible. test whatever is easiest to test. test high risk areas. obtain good test coverage. 13. Which is non-functional software testing? performance testing regression testing unit testing block box testing 14. Software testing which is done without planning and Documentation is known as unit testing functional testing. regression testing adhoc testing 15. Which of the following items would not come under Configuration Management? live data test documentation operating systems user requirement documents 16. Executing the same test case on a modified build called as retesting regression testing sanity testing ad hoc testing 17. Pick the best definition of quality quality is job one zero defects conformance to requirements work as designed 18. Maintenance testing is: testing by users to ensure that the system meets a business need testing a released system that has been changed updating tests when the software has changed testing to maintain business advantage 19. Acceptance testing is known as test automation greybox testing white box testing beta testing 20. Retesting the entire application after a change has been made called as? unit regression regional regression retesting full regression testing 21. Which of the following is false? an incident occurs when expected and actual results differ. an incident can be raised against documentation. incidents should always be fixed. incidents can be analysed to assist in test process improvement. 22. Which of the following is a static test? code inspection usability assessment installation test coverage analysis 23. Configuration management procedures be implemented during ____________ test success test design test execution test planning 24. Which of the following is a black box design technique? usability testing error- guessing equivalence partitioning statement testing 25. Inspections can find all the following except requirements that have been omitted from the design documents spelling and grammar faults in the documents how much of the code has been covered variables not defined in the code 26. One Key reason why developers have difficulty testing their own work is: lack of objectivity lack of training lack of technical documentation lack of test tools on the market for developers 27. ________________ simulates an attack by a malicious party. vulnerability assessment vulnerability scan security audit penetration test 28. Which of the following is not a characteristic for Testability? observability robustness operability simplicity 29. Which of the following is not the integration strategy? big-bang bottom-up design based top-down 30. Which one of the following are non-functional testing methods? performance testing usability testing both usability testing & performance testing system testing 31. In a review meeting a moderator is a person who: mediates between people takes telephone calls takes minutes of the meeting writes the documents to be reviewed 32. What are the Testing Levels? unit testing system testing and acceptance testing. integration testing All of the options 33. Which of these can be successfully tested using Loop Testing methodology? nested loops simple loops concatenated loops All of the options 34. Software testing accounts to what percent of software development costs? 20-10 10-5 40-50 70-80 35. Acceptance test cases are based on what? code requirements design decision table 36. Defect Management process does not include deliverable base-lining management reporting defect prevention none of the options 37. When a new testing tool is purchased, it should be used first by: a small team to establish the best way to use the tool the vendor contractor to write the initial scripts everyone who may eventually have some use for the tool the independent testing team 38. Independent Verification & Validation is done by the test engineers done by an entity outside the projects sphere of influence done by management done by the developer 39. Integration, It will come under cmm level 1 cmm level 3 cmm level 2 none 40. How severely the bug is effecting the application is called as severity traceability fix ability priority 41. Which of the following is not described in a unit test standard? equivalence partitioning modified condition/decision coverage stress testing syntax testing 42. Defects generally fall into the following categories? extra wrong missing All of the options 43. Which of the following is a form of functional testing? performance testing usability testing boundary value analysis security testing 44. White box testing is not called as___________ glass box testing clear box testing open box testing closed box testing 45. SPICE Means software process invention and compatibility determination. software process improvement and compatibility determination. software process improvement and control determination software process improvement and capability determination 46. Retesting of a single program or component after a change has been made? regional regression full regression testing retesting unit regression 47. Which of the following is not a major task of Exit criteria? assessing if more tests are needed. checking test logs against the exit criteria specified in test planning. logging the outcome of test execution. writing a test summary report for stakeholders. Submit Answers Retake Test More Computer Science Engineering Study Material › Computer Science Engineering Mock Tests with Answers Distributed Computing System Mock Test Software Project Management Mock TestArtificial Intelligence and Robotics Mock TestBasics of Database Management Mock TestC# Programming Mock TestC#.NET Programming Mock TestCloud Computing Mock TestCommunication Network Mock TestComputer Architecture Mock TestComputer Architecture and Organization Mock TestComputer Fundamentals Mock TestComputer Networking Mock TestComputer Networks Mock TestCPP Programming Mock TestData Analysis Mock TestData Communication and Computer Network Mock TestData Compression and Data Retrieval Mock TestData Mining and Business Intelligence Mock TestData Mining and Data Warehouse Mock TestData Structure and Algorithms Mock TestData Structures Mock TestDataBase Management System Mock TestDesign and Analysis of Algorithms Mock TestDigital Electronics and Logic Design Mock TestDigital Logic Circuits Mock TestDigital Principles and System Design Mock TestDiscrete Mathematics Mock TestDiscrete Structure Mock TestDotNet Technology Mock TestEmbedded Real Time Operating System Mock TestGreen Computing Mock TestHigh Performance Computing Mock TestInformation Cyber Security Mock TestInformation and Network Security Mock TestInformation Retrival Techniques Mock TestInformation Systems and Engineering Economics Mock TestMachine Learning Mock TestMicroprocessor and Interfacing Technique Mock TestMicroprocessors Mock TestMuli core Architectures and Pro Mock TestMulti core processors Mock TestNetwork Security Mock TestNeural Networks and Fuzzy Control Object Oriented Programming Mock TestOperating System Architecture Mock TestOperating System Mock TestProblem Solving and Python Programming Mock TestProgramming for Problem Solving Mock TestPython Programming Mock TestSoft Computing Mock TestSoftware Design Modeling Mock TestSoftware Engineering Mock TestSoftware Testing Mock TestSoftware Testing and Quality Assurance Mock TestTheory of Computation and Compiler Design Mock TestTheory of Computation Mock TestUbiquitous Computing System Mock Test Computer Science Engineering Mock Tests